Analysis
-
max time kernel
102s -
max time network
106s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
31/03/2025, 14:13
Behavioral task
behavioral1
Sample
Phoenix-Nuker.exe
Resource
win10ltsc2021-20250314-en
15 signatures
150 seconds
Behavioral task
behavioral2
Sample
main.pyc
Resource
win10ltsc2021-20250314-en
3 signatures
150 seconds
General
-
Target
main.pyc
-
Size
7KB
-
MD5
c08e1894e52f7b21ebf5b9b4e1b8729d
-
SHA1
483a9fbd906f99490570820dd1e030b51de40026
-
SHA256
2b8838045c648f16de740a22d8376fb47f2339c354d26a2492242bbd590dbf01
-
SHA512
31f930ec8aa4cb51f8c3dc4de330979fc79b77db207f4b1de8caa0f2135141ae579883e51810933bfe55d59d516f05d7e5a4fdb2af90340e900f09b6cf240099
-
SSDEEP
192:wo5v2EgTRD8GXWdXwEshgFBJhw83WyMdwENyJnw:F5v2/WuFgh283WyPENcw
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6132 OpenWith.exe